Beruflich Dokumente
Kultur Dokumente
TABLE OF CONTENTS
INTRODUCTION HOW IT WORKS USES MODEL COMPARISION WITH OTHER WIRELESS TECHNOLOGIES APPLICATION ADVANTAGES OF BLUETOOTH TECHNOLOGY CONCLUSION REFERENCE
Bluetooth was named for the 10th Century Viking king , Harald Blatand (A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of Denmark, southern Sweden, and southern Norway into one country . In keeping with its namesake, Bluetooth, the new low-cost radio technology, is designed to unite or connect all different types of devices to effectively work as one. By uniting devices, Bluetooth eliminates the need for cabling in a wide range of products, including cellular phones, PCs, headphones, audio equipment, printers, and many more.
Bluetooth Definitions
Piconet: Devices connected in an ad hoc fashion, that is, not requiring predefinition and planning, as with a standard network. Two to eight devices can be networked into a piconet. It is a peer network, that is, once connected, each device has equal access to the others. However, one device is defined as master, and the others as slaves. Scatternet: Several piconets may form a larger scatternet, with each piconet maintaining independence. Master unit: The master in a piconet whose clock and hopping sequence synchronizes the other devices.
Slave unit: Devices in a piconet that are not the master. MAC address: Three bit address that distinguishes each unit in a piconet. Parked units: Piconet devices that are synchronized but don't have MAC Sniff and hold mode: Power-saving mode of a piconet device.
addresses.
Transmission types and rates : The baseband (single channel per line) protocol combines circuit and packet switching. To assure that packets do not arrive out of order, slots (up to five) can be reserved for synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit switching can be either asynchronous or synchronous. Up to three synchronous (voice) data channels, or one synchronous and one asynchronous data channel, can be supported on one channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully
adequate for voice transmissions. An asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an asynchronous connection to support 432.6 Kb/s in both directions if the link is symmetric.
Radio frequency and spectrum hopping : What if there's a lot of radio noise? Won't that interfere with Bluetooth connections? As a rule, the answer is no. It is designed to use fast acknowledgement and frequency hopping, which will make connections robust. It is packet-based, and will jump to a new frequency after each packet is received, which not only helps limit interference problems, but also adds to security. Data rates are one megabyte/second, including headers. Full duplex transmissions (both directions at once) are accomplished via time division multiplexing. The Bluetooth radio chip functions at 2.4 gigahertz, which is in the unlicensed ISM (Industrial Scientific Medical) band. It separates the 2.4 gigahertz frequency band into 79 hops one megahertz apart, starting with 2.402 and ending with 2.480 (though this bandwidth is narrower in Japan, France, and Spain). This spread spectrum is used to hop from one channel to another, pseudo-randomly, which adds a strong layer of security. Up to 1600 hops per second can be made. The standard frequency range is 10 centimeters to 10 meters, and can be extended to at least 100 meters by increasing transmission power.
Data transmission:
Data can be transmitted both synchronously and asynchronously. The Synchronous Connection Oriented (SCO) method is used primarily for voice, and Asynchronous Connectionless (ACL) is primarily for data. Within a piconet, each master-slave pair can use a different transmission mode, and modes can be changed at any time. Time Division Duplex (TDD) is used by both SCO and ACL, and both support 16 types of packets, four of which are control packets that are the same in each type. Because of the need for smoothness in data transmission, SCO packets are generally delivered via reserved intervals, that is, the packets are sent in groups without allowing other transmissions to interrupt. SCO packets can be transmitted without polling by the sending unit. ACL links support both symmetric and assymetric transmissions. Bandwidth is controlled by the master unit, which determines how much of the total each slave unit can use. Slaves cannot transmit data until they have been polled by the master, and the master can broadcast messages to the slave units via ACL link.
Network arrangement:
Bluetooth network arrangements (topology) can be either point-to-point or point-to-multipoint. Any unit in a piconet can establish a connection to another piconet to form a scatternet. See the figure, which diagrams a scatternet in which piconet A, which consists of four units, is connected to piconet B, consisting of two units. Note that the master unit of A is not the link Bluetooth network arrangements (topology) can between the two piconets.
Error correction and security: on code (FEC), 2/3 rate forward error correction code FEC, and automatic repeat request (ARQ). The FEC methods are designed to reduce the number of retransmissions. However, the over hea Three error correction techniques have been defined: 1/3 rate forward error corrected significantly slows transmissions, so is generally not used in relatively error-free environments, with the exception of packet headers. The ARQ scheme requires that the header error and cyclic redundancy checks are okay. When they are, an acknowledge is sent. When they aren't, the data is resent. Security is provided in three ways: through pseudo-random frequency band hops, authentication, and encryption. Frequency band hops make it difficult for anyone to eavesdrop. Authentication allows a user to control connectivity to only devices specified. Encryption uses secret key lengths of 1, 40, and 64 bits. The quality of security is excellent for most applications. However, it is not the highest level available, and for those users who require it, the suggestion is to investigate separate network transfer protocols and security software.
Connection Protocol
Bluetooth connections are established via the following techniques: 1. Standby: Devices not connected in a piconet are in standby mode. In this mode, they listen for messages every 1.28 seconds over 32 hop frequencies (fewer in Japan, Spain, and France). 2. Page/Inquiry: If a device wishes to make a connection with another device, it sends out a page message, if the address is known, or an inquiry followed by a page message, if it is unknown. The master unit sends out 16 identical page messages on 16 hop frequencies to
3. 4.
5. 6.
the slave unit. If there is no response, the master retransmits on the other 16 hop frequencies. The inquiry method requires an extra response from the slave unit, since the MAC address is unknown to the master unit. Active: Data transmission occurs. Hold: When either the master or slave wishes, a hold mode can be established, during which no data is transmitted. The purpose of this is to conserve power. Otherwise, there is a constant data exchange. A typical reason for going into hold mode is the connection of several piconets. Sniff: The sniff mode, applicable only to slave units, is for power conservation, though not at as reduced a level as hold. During this mode, the slave does not take an active role in the piconet, but listens at a reduced level. This is usually a programmable setting. Park: Park mode is a more reduced level of activity than the hold mode. During it, the slave is synchronized to the piconet, thus not requiring full reactivation, but is not part of the traffic. In this state, they do not have MAC addresses, but only listen enough to keep their synchronization with the master and check for broadcast messages.
USAGE MODEL:
While the Bluetooth * usage model is based on connecting devices together, it is focused on three broad categories: voice/data access points, peripheral interconnects, and Personal Area Networking (PAN).
Peripheral Interconnects :
The second category of uses, peripheral interconnects, involves connecting other devices together as shown in Figure 2. Imagine standard keyboards, mice, and joysticks that work over a wireless link. The Bluetooth link is built into the mobile computer; therefore, the cost of the peripheral device is less because an access point is not needed. Additionally, many of these devices can be used in multiple markets. For example, a Bluetooth headset used in the office could be connected to a Bluetooth access point that provides access to the office phone and multimedia functions of the mobile computer. When mobile, the same headset could be used to interface with the cellular phone (which can now remain in a briefcase or purse).Another aspect of a short-range link like Bluetooth is in the area of proximity security devices. In this case, if one device is not within range of another device, the first device will go into a high security mode.
In developing the Bluetooth specification, the SIG is strictly adhering to some basic principles that that can be summed up in five key words: freedom, security, simplicity, versatility and reliability. These keywords are the foundation of Bluetooth technology. To be Bluetooth certified, a device must pass interoperability testing by the Bluetooth Special Interest Group thus assuring that products meeting the specification will be able to interact with all other Bluetoothcertified products and with the Internet. In february1998, the Special Interest Group (SIG) was formed. The founding SIG member are Ericsson, Intel, IBM, Nokia & Toshiba. Since then over 2000 adopter have joined including Compaq, Lucent, Motorola and 3com.
Bluetooth Characteristics:
These are the features of the Bluetooth technology:
It separates the frequency band into hops. This spread spectrum is used to hop from one channel to another, which adds a strong layer of security. Up to eight devices can be networked in a piconet. Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of-sight. Devices do not need to be pointed at each other, as signals are omni-directional. Both synchronous and asynchronous applications are supported, making it easy to implement on a variety of devices and for a variety of services, such as voice and Internet. Governments worldwide regulate it, so it is possible to utilize the same standard wherever one travels.
COMPETING TECHNOLOGIES
While there is no single competing technology that covers the entire concept of Bluetooth wireless technology, in certain market segment other technology do exist.
IrDA
For cable replacement, the infrared standard IrDA has been around for several years and is quite widespread. Most new portable PCs, PDAs, and some cellular phones support IrDA, although actual adoption by users has been rather limited. IrDA is faster than Bluetooth but is limited to point to point connections, Whereas Bluetooth is also capable to point to multi point. IrDAs biggest draw back is that it requires a clear line to sight, and is usually limited to a few feet between devices.
Wireless LAN:
Wireless LAN based on the IEEE 802.11b standard are used to replace a wired LAN throughout a building. The transmission capacity is high and so is the number of simultaneous users. However, compared to Bluetooth, these wireless LANs are more expensive, consume more power and have a larger hardware footprint, making them unsuitable for small mobile devices.
APPLICATIONS: Smart Home Homes equipped with Bluetooth devices may be able to recognise the arrival of its bonafide residents and unlock the door on their arrival. The device will also adjust heat to a preset temperature. While this is happening, the data from the individuals PDA may be exchanged with the home electronic board, and the family calendar is updated to reflect the scheduled activities in the office. The Internet Bridge An extension of this model could be a mobile computer that allows surfing the Internet irrespective of the location of the user, and regardless of whether the user is cordlessly connected through a mobile phone (cellular) or through a wire line connection (e.g. PSTN, ISDN, LAN, xDSL). Automatic Check-in:
Hotels are testing, or plan to test, services that allow guests to check in, unlock room doors and even control room temperature with handheld devices equipped with Bluetooth Technology. The Bluetooth enabled mobile phone or the PDA can present the electronic ticket to the airline system without one having to go through the queue at the check-in counters. The airline's on-line system performs the identification via the ID-tag feature built into the mobile phone or the PDA and confirms the reserved seat. The Three-in-one Phone With Bluetooth support, one handset will be able to provide multiple functionality. When at home, the phone functions as a cordless phone, connected to the fixed line. When on the move, it functions as a mobile phone connected to the mobile network. Additionally, when the phone comes within range of another mobile phone with built-in Bluetooth technology, it functions as a walkie-talkie.
References :
1. The official Bluetooth site,http:/www.bluetooth.com 2. http://www.intel.com/mobile/bluetooth 3. The wireless connectivity Technologies Comparison, Infrared and Radio Frequency, Infrared Data Association, September 1998.